* [Qemu-devel] [PATCH fixup 0/2] Vhost device IOTLB fixup for vfio enablment @ 2017-03-20 3:36 Jason Wang 2017-03-20 3:36 ` [Qemu-devel] [PATCH fixup 1/2] intel_iommu: use the correct memory region for device IOTLB notification Jason Wang 2017-03-20 3:36 ` [Qemu-devel] [PATCH fixup 2/2] vhost: genearlize iommu memory region Jason Wang 0 siblings, 2 replies; 9+ messages in thread From: Jason Wang @ 2017-03-20 3:36 UTC (permalink / raw) To: mst, peterx, qemu-devel; +Cc: Jason Wang Hi: This series is a fixup for vfio enablement series which breaks vhost device IOTLB. The main reason is that vhost device IOTLB assumes the iommu region were alwasy as->root. Fixing by using a memory listener to register iommu notifiers. Please review. Jason Wang (2): intel_iommu: use the correct memory region for device IOTLB notification vhost: genearlize iommu memory region hw/i386/intel_iommu.c | 2 +- hw/virtio/vhost.c | 93 +++++++++++++++++++++++++++++++++++++---------- include/hw/virtio/vhost.h | 10 +++++ 3 files changed, 84 insertions(+), 21 deletions(-) -- 2.7.4 ^ permalink raw reply [flat|nested] 9+ messages in thread
* [Qemu-devel] [PATCH fixup 1/2] intel_iommu: use the correct memory region for device IOTLB notification 2017-03-20 3:36 [Qemu-devel] [PATCH fixup 0/2] Vhost device IOTLB fixup for vfio enablment Jason Wang @ 2017-03-20 3:36 ` Jason Wang 2017-03-20 7:10 ` Peter Xu 2017-03-20 3:36 ` [Qemu-devel] [PATCH fixup 2/2] vhost: genearlize iommu memory region Jason Wang 1 sibling, 1 reply; 9+ messages in thread From: Jason Wang @ 2017-03-20 3:36 UTC (permalink / raw) To: mst, peterx, qemu-devel Cc: Jason Wang, Paolo Bonzini, Richard Henderson, Eduardo Habkost We have a specific memory region for DMAR now, so it's wrong to trigger the notifier with the root region. Cc: Michael S. Tsirkin <mst@redhat.com> Cc: Paolo Bonzini <pbonzini@redhat.com> Cc: Richard Henderson <rth@twiddle.net> Cc: Eduardo Habkost <ehabkost@redhat.com> Signed-off-by: Jason Wang <jasowang@redhat.com> --- hw/i386/intel_iommu.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hw/i386/intel_iommu.c b/hw/i386/intel_iommu.c index 9b1ba1b..bc95304 100644 --- a/hw/i386/intel_iommu.c +++ b/hw/i386/intel_iommu.c @@ -1709,7 +1709,7 @@ static bool vtd_process_device_iotlb_desc(IntelIOMMUState *s, entry.iova = addr; entry.perm = IOMMU_NONE; entry.translated_addr = 0; - memory_region_notify_iommu(entry.target_as->root, entry); + memory_region_notify_iommu(&vtd_dev_as->iommu, entry); done: return true; -- 2.7.4 ^ permalink raw reply related [flat|nested] 9+ messages in thread
* Re: [Qemu-devel] [PATCH fixup 1/2] intel_iommu: use the correct memory region for device IOTLB notification 2017-03-20 3:36 ` [Qemu-devel] [PATCH fixup 1/2] intel_iommu: use the correct memory region for device IOTLB notification Jason Wang @ 2017-03-20 7:10 ` Peter Xu 0 siblings, 0 replies; 9+ messages in thread From: Peter Xu @ 2017-03-20 7:10 UTC (permalink / raw) To: Jason Wang Cc: mst, qemu-devel, Paolo Bonzini, Richard Henderson, Eduardo Habkost On Mon, Mar 20, 2017 at 11:36:38AM +0800, Jason Wang wrote: > We have a specific memory region for DMAR now, so it's wrong to > trigger the notifier with the root region. > > Cc: Michael S. Tsirkin <mst@redhat.com> > Cc: Paolo Bonzini <pbonzini@redhat.com> > Cc: Richard Henderson <rth@twiddle.net> > Cc: Eduardo Habkost <ehabkost@redhat.com> > Signed-off-by: Jason Wang <jasowang@redhat.com> Reviewed-by: Peter Xu <peterx@redhat.com> -- peterx ^ permalink raw reply [flat|nested] 9+ messages in thread
* [Qemu-devel] [PATCH fixup 2/2] vhost: genearlize iommu memory region 2017-03-20 3:36 [Qemu-devel] [PATCH fixup 0/2] Vhost device IOTLB fixup for vfio enablment Jason Wang 2017-03-20 3:36 ` [Qemu-devel] [PATCH fixup 1/2] intel_iommu: use the correct memory region for device IOTLB notification Jason Wang @ 2017-03-20 3:36 ` Jason Wang 2017-03-20 9:07 ` Peter Xu 1 sibling, 1 reply; 9+ messages in thread From: Jason Wang @ 2017-03-20 3:36 UTC (permalink / raw) To: mst, peterx, qemu-devel; +Cc: Jason Wang We assumes the iommu_ops were attached to the root region of address space. This may not true for all kinds of IOMMU implementation. So fix this by not assume as->root has iommu_ops and: - register a memory listener to dma_as - during region_add, if it's a region of IOMMU, register a specific IOMMU notifier, and store all notifiers in a list - during region_del, compare and delete the IOMMU notifier This is a must for making vhost device IOTLB works for IOMMU other than intel ones. Signed-off-by: Jason Wang <jasowang@redhat.com> --- hw/virtio/vhost.c | 93 +++++++++++++++++++++++++++++++++++++---------- include/hw/virtio/vhost.h | 10 +++++ 2 files changed, 83 insertions(+), 20 deletions(-) diff --git a/hw/virtio/vhost.c b/hw/virtio/vhost.c index ccf8b2e..45f75da 100644 --- a/hw/virtio/vhost.c +++ b/hw/virtio/vhost.c @@ -425,10 +425,8 @@ static inline void vhost_dev_log_resize(struct vhost_dev *dev, uint64_t size) static int vhost_dev_has_iommu(struct vhost_dev *dev) { VirtIODevice *vdev = dev->vdev; - AddressSpace *dma_as = vdev->dma_as; - return memory_region_is_iommu(dma_as->root) && - virtio_host_has_feature(vdev, VIRTIO_F_IOMMU_PLATFORM); + return virtio_host_has_feature(vdev, VIRTIO_F_IOMMU_PLATFORM); } static void *vhost_memory_map(struct vhost_dev *dev, hwaddr addr, @@ -720,6 +718,69 @@ static void vhost_region_del(MemoryListener *listener, } } +static void vhost_iommu_unmap_notify(IOMMUNotifier *n, IOMMUTLBEntry *iotlb) +{ + struct vhost_iommu *iommu = container_of(n, struct vhost_iommu, n); + struct vhost_dev *hdev = iommu->hdev; + + if (hdev->vhost_ops->vhost_invalidate_device_iotlb(hdev, + iotlb->iova, + iotlb->addr_mask + 1)) { + error_report("Fail to invalidate device iotlb"); + } +} + +static void vhost_iommu_region_add(MemoryListener *listener, + MemoryRegionSection *section) +{ + struct vhost_dev *dev = container_of(listener, struct vhost_dev, + iommu_listener); + struct vhost_iommu *iommu; + Int128 llend; + + if (!memory_region_is_iommu(section->mr)) { + return; + } + + llend = int128_make64(section->offset_within_address_space); + llend = int128_add(llend, section->size); + llend = int128_sub(llend, int128_one()); + + iommu = g_malloc0(sizeof(*iommu)); + iommu->mr = section->mr; + iommu->hdev = dev; + iommu_notifier_init(&iommu->n, vhost_iommu_unmap_notify, + IOMMU_NOTIFIER_UNMAP, + section->offset_within_region, + int128_get64(llend)); + memory_region_register_iommu_notifier(section->mr, &iommu->n); + /* TODO: can replay help performance here? */ + QLIST_INSERT_HEAD(&dev->iommu_list, iommu, iommu_next); +} + +static void vhost_iommu_region_del(MemoryListener *listener, + MemoryRegionSection *section) +{ + struct vhost_dev *dev = container_of(listener, struct vhost_dev, + iommu_listener); + struct vhost_iommu *iommu; + + if (!memory_region_is_iommu(section->mr)) { + return; + } + + QLIST_FOREACH(iommu, &dev->iommu_list, iommu_next) { + if (iommu->mr == section->mr && + iommu->n.start == section->offset_within_region) { + memory_region_unregister_iommu_notifier(iommu->mr, + &iommu->n); + QLIST_REMOVE(iommu, iommu_next); + g_free(iommu); + break; + } + } +} + static void vhost_region_nop(MemoryListener *listener, MemoryRegionSection *section) { @@ -1161,17 +1222,6 @@ static void vhost_virtqueue_cleanup(struct vhost_virtqueue *vq) event_notifier_cleanup(&vq->masked_notifier); } -static void vhost_iommu_unmap_notify(IOMMUNotifier *n, IOMMUTLBEntry *iotlb) -{ - struct vhost_dev *hdev = container_of(n, struct vhost_dev, n); - - if (hdev->vhost_ops->vhost_invalidate_device_iotlb(hdev, - iotlb->iova, - iotlb->addr_mask + 1)) { - error_report("Fail to invalidate device iotlb"); - } -} - int vhost_dev_init(struct vhost_dev *hdev, void *opaque, VhostBackendType backend_type, uint32_t busyloop_timeout) { @@ -1244,6 +1294,11 @@ int vhost_dev_init(struct vhost_dev *hdev, void *opaque, .priority = 10 }; + hdev->iommu_listener = (MemoryListener) { + .region_add = vhost_iommu_region_add, + .region_del = vhost_iommu_region_del, + }; + iommu_notifier_init(&hdev->n, vhost_iommu_unmap_notify, IOMMU_NOTIFIER_UNMAP, 0, ~0ULL); @@ -1454,9 +1509,8 @@ int vhost_dev_start(struct vhost_dev *hdev, VirtIODevice *vdev) goto fail_features; } - if (vhost_dev_has_iommu(hdev)) { - memory_region_register_iommu_notifier(vdev->dma_as->root, - &hdev->n); + if (true) { + memory_listener_register(&hdev->iommu_listener, vdev->dma_as); } r = hdev->vhost_ops->vhost_set_mem_table(hdev, hdev->mem); @@ -1536,10 +1590,9 @@ void vhost_dev_stop(struct vhost_dev *hdev, VirtIODevice *vdev) hdev->vq_index + i); } - if (vhost_dev_has_iommu(hdev)) { + if (true) { hdev->vhost_ops->vhost_set_iotlb_callback(hdev, false); - memory_region_unregister_iommu_notifier(vdev->dma_as->root, - &hdev->n); + memory_listener_unregister(&hdev->iommu_listener); } vhost_log_put(hdev, true); hdev->started = false; diff --git a/include/hw/virtio/vhost.h b/include/hw/virtio/vhost.h index 52f633e..4d89dcd 100644 --- a/include/hw/virtio/vhost.h +++ b/include/hw/virtio/vhost.h @@ -37,10 +37,19 @@ struct vhost_log { vhost_log_chunk_t *log; }; +struct vhost_dev; +struct vhost_iommu { + struct vhost_dev *hdev; + MemoryRegion *mr; + IOMMUNotifier n; + QLIST_ENTRY(vhost_iommu) iommu_next; +}; + struct vhost_memory; struct vhost_dev { VirtIODevice *vdev; MemoryListener memory_listener; + MemoryListener iommu_listener; struct vhost_memory *mem; int n_mem_sections; MemoryRegionSection *mem_sections; @@ -64,6 +73,7 @@ struct vhost_dev { void *opaque; struct vhost_log *log; QLIST_ENTRY(vhost_dev) entry; + QLIST_HEAD(,vhost_iommu) iommu_list; IOMMUNotifier n; }; -- 2.7.4 ^ permalink raw reply related [flat|nested] 9+ messages in thread
* Re: [Qemu-devel] [PATCH fixup 2/2] vhost: genearlize iommu memory region 2017-03-20 3:36 ` [Qemu-devel] [PATCH fixup 2/2] vhost: genearlize iommu memory region Jason Wang @ 2017-03-20 9:07 ` Peter Xu 2017-03-21 1:12 ` Michael S. Tsirkin 0 siblings, 1 reply; 9+ messages in thread From: Peter Xu @ 2017-03-20 9:07 UTC (permalink / raw) To: Jason Wang; +Cc: mst, qemu-devel On Mon, Mar 20, 2017 at 11:36:39AM +0800, Jason Wang wrote: > We assumes the iommu_ops were attached to the root region of address > space. This may not true for all kinds of IOMMU implementation. So fix > this by not assume as->root has iommu_ops and: > > - register a memory listener to dma_as > - during region_add, if it's a region of IOMMU, register a specific > IOMMU notifier, and store all notifiers in a list > - during region_del, compare and delete the IOMMU notifier > > This is a must for making vhost device IOTLB works for IOMMU other > than intel ones. > > Signed-off-by: Jason Wang <jasowang@redhat.com> [...] > @@ -1454,9 +1509,8 @@ int vhost_dev_start(struct vhost_dev *hdev, VirtIODevice *vdev) > goto fail_features; > } > > - if (vhost_dev_has_iommu(hdev)) { > - memory_region_register_iommu_notifier(vdev->dma_as->root, > - &hdev->n); > + if (true) { Here the if clause can be removed. And... > + memory_listener_register(&hdev->iommu_listener, vdev->dma_as); > } > > r = hdev->vhost_ops->vhost_set_mem_table(hdev, hdev->mem); > @@ -1536,10 +1590,9 @@ void vhost_dev_stop(struct vhost_dev *hdev, VirtIODevice *vdev) > hdev->vq_index + i); > } > > - if (vhost_dev_has_iommu(hdev)) { > + if (true) { ...here. Besides that: Reviewed-by: Peter Xu <peterx@redhat.com> Since this patchset depends on vtd vfio series and fixes its breakage to vhost, I'll pick them up for consistency for next post of vtd vfio series as well. Thanks, -- peterx ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Qemu-devel] [PATCH fixup 2/2] vhost: genearlize iommu memory region 2017-03-20 9:07 ` Peter Xu @ 2017-03-21 1:12 ` Michael S. Tsirkin 2017-03-21 1:21 ` Eric Blake 0 siblings, 1 reply; 9+ messages in thread From: Michael S. Tsirkin @ 2017-03-21 1:12 UTC (permalink / raw) To: Peter Xu; +Cc: Jason Wang, qemu-devel On Mon, Mar 20, 2017 at 05:07:34PM +0800, Peter Xu wrote: > On Mon, Mar 20, 2017 at 11:36:39AM +0800, Jason Wang wrote: > > We assumes the iommu_ops were attached to the root region of address > > space. This may not true for all kinds of IOMMU implementation. So fix > > this by not assume as->root has iommu_ops and: > > > > - register a memory listener to dma_as > > - during region_add, if it's a region of IOMMU, register a specific > > IOMMU notifier, and store all notifiers in a list > > - during region_del, compare and delete the IOMMU notifier > > > > This is a must for making vhost device IOTLB works for IOMMU other > > than intel ones. > > > > Signed-off-by: Jason Wang <jasowang@redhat.com> > > [...] > > > @@ -1454,9 +1509,8 @@ int vhost_dev_start(struct vhost_dev *hdev, VirtIODevice *vdev) > > goto fail_features; > > } > > > > - if (vhost_dev_has_iommu(hdev)) { > > - memory_region_register_iommu_notifier(vdev->dma_as->root, > > - &hdev->n); > > + if (true) { > > Here the if clause can be removed. And... > > > + memory_listener_register(&hdev->iommu_listener, vdev->dma_as); > > } > > > > r = hdev->vhost_ops->vhost_set_mem_table(hdev, hdev->mem); > > @@ -1536,10 +1590,9 @@ void vhost_dev_stop(struct vhost_dev *hdev, VirtIODevice *vdev) > > hdev->vq_index + i); > > } > > > > - if (vhost_dev_has_iommu(hdev)) { > > + if (true) { > > ...here. Besides that: > > Reviewed-by: Peter Xu <peterx@redhat.com> > > Since this patchset depends on vtd vfio series and fixes its breakage > to vhost, I'll pick them up for consistency for next post of vtd vfio > series as well. > > Thanks, > > -- peterx Sounds good. It's best to order patches in a way that avoids breakages even for people that bisect though. Might require some patch squashing. -- MST ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Qemu-devel] [PATCH fixup 2/2] vhost: genearlize iommu memory region 2017-03-21 1:12 ` Michael S. Tsirkin @ 2017-03-21 1:21 ` Eric Blake 2017-03-21 1:39 ` Peter Xu 0 siblings, 1 reply; 9+ messages in thread From: Eric Blake @ 2017-03-21 1:21 UTC (permalink / raw) To: Michael S. Tsirkin, Peter Xu; +Cc: Jason Wang, qemu-devel [-- Attachment #1: Type: text/plain, Size: 835 bytes --] On 03/20/2017 08:12 PM, Michael S. Tsirkin wrote: >> >> Since this patchset depends on vtd vfio series and fixes its breakage >> to vhost, I'll pick them up for consistency for next post of vtd vfio >> series as well. >> >> Thanks, >> >> -- peterx > > Sounds good. It's best to order patches in a way that avoids > breakages even for people that bisect though. > Might require some patch squashing. Indeed - a patch submitted with 'fixup' in the title is usually best incorporated by squashing into a prior patch that has not actually landed in master, rather than as a standalone patch. But if you do post this to master as a standalone patch, please fix the subject line: s/genearlize/generalize/ -- Eric Blake eblake redhat com +1-919-301-3266 Libvirt virtualization library http://libvirt.org [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 604 bytes --] ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Qemu-devel] [PATCH fixup 2/2] vhost: genearlize iommu memory region 2017-03-21 1:21 ` Eric Blake @ 2017-03-21 1:39 ` Peter Xu 2017-03-29 2:57 ` Jason Wang 0 siblings, 1 reply; 9+ messages in thread From: Peter Xu @ 2017-03-21 1:39 UTC (permalink / raw) To: Eric Blake; +Cc: Michael S. Tsirkin, Jason Wang, qemu-devel On Mon, Mar 20, 2017 at 08:21:44PM -0500, Eric Blake wrote: > On 03/20/2017 08:12 PM, Michael S. Tsirkin wrote: > > >> > >> Since this patchset depends on vtd vfio series and fixes its breakage > >> to vhost, I'll pick them up for consistency for next post of vtd vfio > >> series as well. > >> > >> Thanks, > >> > >> -- peterx > > > > Sounds good. It's best to order patches in a way that avoids > > breakages even for people that bisect though. > > Might require some patch squashing. > > Indeed - a patch submitted with 'fixup' in the title is usually best > incorporated by squashing into a prior patch that has not actually > landed in master, rather than as a standalone patch. > > But if you do post this to master as a standalone patch, please fix the > subject line: s/genearlize/generalize/ Will do. Thanks! -- peterx ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Qemu-devel] [PATCH fixup 2/2] vhost: genearlize iommu memory region 2017-03-21 1:39 ` Peter Xu @ 2017-03-29 2:57 ` Jason Wang 0 siblings, 0 replies; 9+ messages in thread From: Jason Wang @ 2017-03-29 2:57 UTC (permalink / raw) To: Peter Xu, Eric Blake; +Cc: Michael S. Tsirkin, qemu-devel On 2017年03月21日 09:39, Peter Xu wrote: > On Mon, Mar 20, 2017 at 08:21:44PM -0500, Eric Blake wrote: >> On 03/20/2017 08:12 PM, Michael S. Tsirkin wrote: >> >>>> Since this patchset depends on vtd vfio series and fixes its breakage >>>> to vhost, I'll pick them up for consistency for next post of vtd vfio >>>> series as well. >>>> >>>> Thanks, >>>> >>>> -- peterx >>> Sounds good. It's best to order patches in a way that avoids >>> breakages even for people that bisect though. >>> Might require some patch squashing. >> Indeed - a patch submitted with 'fixup' in the title is usually best >> incorporated by squashing into a prior patch that has not actually >> landed in master, rather than as a standalone patch. >> >> But if you do post this to master as a standalone patch, please fix the >> subject line: s/genearlize/generalize/ > Will do. Thanks! > > -- peterx Looks like the assumption were broken by the introducing of bus master container, so this patch is needed for 2.9. Will post a formal patch for this. Thanks ^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2017-03-29 2:58 UTC | newest] Thread overview: 9+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2017-03-20 3:36 [Qemu-devel] [PATCH fixup 0/2] Vhost device IOTLB fixup for vfio enablment Jason Wang 2017-03-20 3:36 ` [Qemu-devel] [PATCH fixup 1/2] intel_iommu: use the correct memory region for device IOTLB notification Jason Wang 2017-03-20 7:10 ` Peter Xu 2017-03-20 3:36 ` [Qemu-devel] [PATCH fixup 2/2] vhost: genearlize iommu memory region Jason Wang 2017-03-20 9:07 ` Peter Xu 2017-03-21 1:12 ` Michael S. Tsirkin 2017-03-21 1:21 ` Eric Blake 2017-03-21 1:39 ` Peter Xu 2017-03-29 2:57 ` Jason Wang
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).